Reference List for Engineering Trustworthy Cyber-Physical...

14
Prof. Dr. Frank J. Furrer Reference List for “Engineering Trustworthy Cyber-Physical Systems” Version 0.2 / 2.4.2019 Alberts19 Christopher Alberts and Carol Woody: An Approach for integrating the Security Engineering Risk Analysis (SERA) Method with Threat Modeling Software Engineering Institute (SEI), White Paper, February 2019. Downloadable from: https://resources.sei.cmu.edu/asset_files/WhitePaper/2019_019_ 001_539814.pdf [last accessed: 21.2.2019] Allocco10 Michael Allocco: Safety Analyses of Complex Systems – Considerations of Software, Firmware, Hardware, Human, and the Environment John Wiley & Sons, Inc., N.Y., USA, 2010. ISBN 978-0-470-58770- 6 Alur15 Rajeev Alur: Principles of Cyber-Physical Systems MIT Press, USA, 2015. ISBN 978-0-262-02911-7 Aroms12 Emmanuel Aroms: NIST Special Publication 800-55 Rev1: Security Metrics Guide for Information Technology Systems CreateSpace Independent Publishing Platform, 2012. ISBN 978-1- 4701-5204-8 Axelrod13 C. Warren Axelrod: Engineering Safe and Secure Software Systems Artech House, Norwood, USA, 2013. ISBN 978-1-60807-472-3 Axelsson15 Jakob Axelsson: Safety Analysis for Systems-of-Systems ERCIM NEWS, Number 102 July 2015. Special theme “Trustworthy Systems of Systems”, p. 22-23. Downloadable from: https://ercim-news.ercim.eu/images/stories/EN102/EN102- web.pdf [last accessed: 7.9.2018] Bondavalli16 Andrea Bondavalli, Sara Bouchenak, Hermann Kopetz (Editors): Cyber-Physical Systems of Systems: Foundations - A Conceptual Model and Some Derivations: The AMADEOS Legacy Springer Lecture Notes in Computer Science, Heidelberg, Germany, 2016. ISBN 978-3-319-47589-9 Brotby08 W. Krag Brotby: Information Security Management Metrics - A Definitive Guide to Effective Security Monitoring and Measurement Taylor & Francis Ltd, 2008. ISBN 978-1-420-05285-5 Brotby13 W. Krag Brotby, Gary Hinson: PRAGMATIC Security Metrics - Applying Metametrics to Information Security Taylor & Francis Ltd., 2013. ISBN 978-1- 439-88152-1 Buchanan02 Robert Buchanan: Disaster Proofing Information Systems – A Complete Methodology for Eliminating Single Points of Failure McGraw-Hill Education, USA, 2002. ISBN 978-0-071-40922-3

Transcript of Reference List for Engineering Trustworthy Cyber-Physical...

Prof. Dr. Frank J. Furrer

Reference List for “Engineering Trustworthy Cyber-Physical Systems”

Version 0.2 / 2.4.2019

Alberts19 Christopher Alberts and Carol Woody:

An Approach for integrating the Security Engineering Risk Analysis (SERA) Method with Threat Modeling

Software Engineering Institute (SEI), White Paper, February 2019.

Downloadable from:

https://resources.sei.cmu.edu/asset_files/WhitePaper/2019_019_

001_539814.pdf [last accessed: 21.2.2019]

Allocco10 Michael Allocco:

Safety Analyses of Complex Systems – Considerations of Software, Firmware, Hardware, Human, and the Environment

John Wiley & Sons, Inc., N.Y., USA, 2010. ISBN 978-0-470-58770-

6

Alur15 Rajeev Alur:

Principles of Cyber-Physical Systems

MIT Press, USA, 2015. ISBN 978-0-262-02911-7

Aroms12 Emmanuel Aroms:

NIST Special Publication 800-55 Rev1: Security Metrics Guide

for Information Technology Systems

CreateSpace Independent Publishing Platform, 2012. ISBN 978-1-

4701-5204-8

Axelrod13 C. Warren Axelrod:

Engineering Safe and Secure Software Systems

Artech House, Norwood, USA, 2013. ISBN 978-1-60807-472-3

Axelsson15 Jakob Axelsson:

Safety Analysis for Systems-of-Systems

ERCIM NEWS, Number 102 July 2015. Special theme “Trustworthy

Systems of Systems”, p. 22-23. Downloadable from:

https://ercim-news.ercim.eu/images/stories/EN102/EN102-

web.pdf [last accessed: 7.9.2018]

Bondavalli16 Andrea Bondavalli, Sara Bouchenak, Hermann Kopetz (Editors):

Cyber-Physical Systems of Systems: Foundations - A

Conceptual Model and Some Derivations: The AMADEOS

Legacy

Springer Lecture Notes in Computer Science, Heidelberg, Germany,

2016. ISBN 978-3-319-47589-9

Brotby08 W. Krag Brotby:

Information Security Management Metrics - A Definitive Guide

to Effective Security Monitoring and Measurement

Taylor & Francis Ltd, 2008. ISBN 978-1-420-05285-5

Brotby13 W. Krag Brotby, Gary Hinson:

PRAGMATIC Security Metrics - Applying Metametrics to

Information Security Taylor & Francis Ltd., 2013. ISBN 978-1-

439-88152-1

Buchanan02 Robert Buchanan:

Disaster Proofing Information Systems – A Complete

Methodology for Eliminating Single Points of Failure

McGraw-Hill Education, USA, 2002. ISBN 978-0-071-40922-3

Butler07 Michael Butler, Cliff Jones, Alexander Romanovsky, Elena Troubytsina (Editors):

Rigorous Development of Complex Fault-Tolerant Systems

Springer-Verlag, Berlin (Lecture Notes in Computer Science, Band

4157), 2007. ISBN 978-3-540-48265-9

Butler10 Michael Butler, Cliff B. Jones, Alexander Romanovsky, Elena Troubitsyna:

Methods, Models and Tools for Fault Tolerance

Springer-Verlag, Berlin Heidelberg (Lecture Notes in Computer

Science, Band 5454), 2010). ISBN 978-3-642-00866-5

Cappelli12 Dawn M. Cappelli, Andrew P. Moore, Randall F. Trzeciak:

The CERT Guide to Insider Threats – How to Prevent, Detect, and Respond to Information Technology Crimes

Addison Wesley, N.J., USA (SEI Series in Software Engineering),

2012. ISBN 978-0-321-81257-5

Corera17 Gordon Corera:

Cyberspies – The Secret History of Surveillance, Hacking, and Digital Espionage

Pegasus Books, 2017. ISBN 978-1-6817-7459-6

Day17 Ronald William Day:

Design Error – A Human Factors Approach

Taylor and Francis (CRC Press), Boca Raton, FL, USA, 2017. ISBN

978-1-4987-8367-5

Dearden18 Harvey T. Dearden:

Functional Safety In Practice

CreateSpace Independent Publishing Platform, 2nd edition, 2018.

ISBN 978-1-9782-4641-6

DeSilva15 Eugenie De Silva (Editor):

National Security and Counterintelligence in the Era of Cyber

Espionage

Information Science Reference (Advances in Digital Crime,

Forensics, and Cyber Terrorism), 2015. ISBN 978-1-4666-9661-7

Diogenes18 Yuri Diogenes, Erdal Ozkaya:

Cybersecurity – Attack and Defense Strategies: Infrastructure

Security with Red Team and Blue Team Tactics

Packt Publishing Inc., Birmingham, UK, 2018. ISBN 978-1-7884-

7529-7

Dubrova13 Elena Dubrova:

Fault-Tolerant Design

Springer-Verlag, 2013. ISBN 978-1-461-42112-2

Elisan15 Christopher C. Elisan:

Advanced Malware Analysis

McGraw-Hill Education Ltd., 2015. ISBN 978-0-071-81974-9

ERCIM15 ERCIM NEWS, Number 102 July 2015. Special theme “Trustworthy

Systems of Systems”. Downloadable from:

https://ercim-news.ercim.eu/images/stories/EN102/EN102-

web.pdf [last accessed: 7.9.2018]

Farley17 John Farley:

Online and Under Attack – What Every Business Needs To Do

Now To Manage Cyber Risk and Win Its Cyber War

CreateSpace Independent Publishing Platform, 2017. ISBN 978-1-

5423-4290-2

Fernandez-Buglioni13

Eduardo Fernandez-Buglioni

Security Patterns in Practice: Designing Secure Architectures

Using Software Patterns

John Wiley & Sons, USA, 2013. ISBN 978-1-119-99894-5

Fiaschetti18 Andrea Fiaschetti, Josef Noll, Paolo Azzoni, Roberto Uribeetxeberria (Editors):

Measurable and Composable Security, Privacy, and Dependability for Cyberphysical Systems – The SHIELD

Methodology

Taylor & Francis Ltd., USA, 2018. ISBN 978-1-138-04275-9

Flammini12 Francesco Flammini (Edotir):

Railway Safety, Reliability, and Security – Technologies and Systems Engineering

Information Science Reference (IGI Global), PA, USA, 2012. ISBN

978-1-4666-1643-1

Flammini18 Francesco Flammini (Editor):

Resilience of Cyber-Physical Systems – From Risk Modelling to Threat Counteraction

Springer-Verlag, 2018. ISBN 978-3-319-95596-4

Flammini19 Francesco Flammini (Editor):

Resilience of Cyber-Physical Systems – From Risk

Modelling to Threat Counteraction

Springer-Verlag, 2019. ISBN 978-3-319-95596-4

Francis14 Royce Francis, Behailu Bekera:

A metric and frameworks for resilience analysis of

engineered and infrastructure systems

Reliability Engineering and System Safety, 121 (2014), pp. 90 –

103. Downloadable from:

https://blogs.gwu.edu/seed/files/2012/07/Reliability-

Engineering-and-System-Safety-2014-Francis-1y5jkh9.pdf [last

accessed 3.9.2017]

Freund14 Jack Freund, Jack Jones:

Measuring and Managing Information Risk - A FAIR Approach

Butterworth-Heinemann Publisher, 2014. ISBN 978-0-124-20231-

3

Goloubeva06 Olga Goloubeva, Maurizio Rebaudengo, Matteo Sonza Reorda, Massimo Violante:

Software-Implemented Hardware Fault Tolerance

Springer-Verlag, 2006. ISBN 978-0-387-26060-0

Goodman15 Marc Goodman:

Future Crimes – Everything Is Connected, Everyone Is

Vulnerable and What We Can Do About It

Doubleday Publisher, USA, 2015. ISBN 978-0-385-53900-5

Griffor16 Edward Griffor:

Handbook of System Safety and Security – Cyber Risk and

Risk Management, Cyber Security, Threat Analysis,

Functional Safety, Software Systems, and Cyber Physical

Systems

Syngress Media, USA, 2016. ISBN 978-0-1280-3773-7

Gudera16 Andy Gudera:

Beware of Car Hacking – A Systematic Analysis

tredition GmbH, Hamburg, 2016. ISBN 978-3-7323-6368-1

Gullo18 Louis J. Gullo, Jack Dixon (Editors):

Design for Safety

John Wiley & Sons, Hoboken, NJ, USA, 2018. ISBN 978-1-118-

97429-2

Gumzej18 Roman Gumzej:

Engineering Safe and Secure Cyber-Physical Systems – The Specification PEARL Approach

Springer International Publishing, Switzerland, 2018 (Softcover reprint of the original 1st ed. 2016. ISBN 978-3-319-80454-5

Gutteridge18 Lance Gutteridge:

Avoiding IT Disasters – Fallacies about enterprise systems

and how you can rise above them

Thinking Works, 2018. ISBN978-1-7753-5750-6

Hanmer07 Robert Hanmer:

Patterns for Fault Tolerant Software

John Wiley & Sons, USA, 2007. ISBN 978-0-470-31979-6

Hanssen18 Geir Kjetil Hanssen, Tor Stålhane, Thor Myklebust:

SafeScrum – Agile Development of Safety-Critical Software

Springer-Verlag, Germany, 2018. ISBN 978-3-319-99333-1

Hayden10 Lance Hayden:

IT Security Metrics - A Practical Framework for Measuring

Security and Protecting Data

McGraw-Hill Education Ltd., 2010. ISBN 978-0-071-71340-5

Herrmann07 Debra S. Herrmann:

Complete Guide to Security and Privacy Metrics - Measuring

Regulatory Compliance, Operational Resilience, and ROI

Auerbach Publishers Inc., 2007. ISBN 978-0-8493-5402-1

Hobbs15 Chris Hobbs:

Embedded Software Development for Safety-Critical Systems

Taylor & Francis, Inc., USA, 2015. ISBN 978-1-498-72670-2

Hodson19 Christopher Hodson

Cyber Risk Management

Kogan Page, 2019. ISBN 978-0-749-48412-5

Hoffman14 Jeff Hoffman:

Intruders at the Gate – Building an Effective Malware Defense

System

CreateSpace Independent Publishing Platform, 2014. ISBN 978-1-

5004-7957-2

Hole16 Kjell Jørgen Hole:

Anti-fragile ICT Systems

Springer-Verlag, 2016. ISBN 978-3-319-30068-9

Hollnagel06 Erik Hollnagel, David D. Woods, Nancy Leveson (Editors):

Resilience Engineering – Concepts and Precepts

Ashgate Publishing Ltd., Aldershot, UK, 2006. ISBN 978-0-7546-

4904-5

Hollnagel13 Erik Hollnagel, Jean Paries, David D. Woods, John Wreathall:

Resilience Engineering in Practice – A Guidebook

CRC Press, New edition, 2013. ISBN 978-1-472-42074-9

Hollnagel14 Erik Hollnagel:

Safety-I and Safety-II – The Past and Future of Safety

Management

Routledge Publishing, New edition, 2014. ISBN 978-1-4724-2308-5

Hopkin18 Paul Hopkin:

Fundamentals of Risk Management – Understanding,

Evaluating and Implementing Effective Risk Management

Kogan Page, 5th edition, 2018. ISBN 978-0-749-48307-4

Hsu18 Tony Hsu:

Hands-On Security in DevOps – Ensure continuous Security,

Deployment, and Delivery with DevSecOps

Packt Publishing, Birmingham, UK, 2018. ISBN 978-1-788995-50-

4

Hubbard16 Douglas W. Hubbard, Richard Seiersen:

How to Measure Anything in Cybersecurity Risk

John Wiley & Sons, Inc., 2016. ISBN 978-1-119-08529-4

Jackson10 Scott Jackson:

Architecting Resilient Systems – Accident Avoidance and

Survival and Recovery from Disruptions

John Wiley & Sons, Inc., New Jersey, USA, 2010. ISBN 978-0-470-

40503-1

Jain17 Tushar Jain, Joseph J. Yamé, Dominique Sauter:

Active Fault-Tolerant Control Systems – A Behavioral System

Theoretic Perspective

Springer-Verlag, 2017. ISBN 978-3-319-68827-5

Jamshidi09a Mo Jamshidi (Editor):

Systems of Systems Engineering – Principles and Applications

CRC Press, Taylor & Francis Group, Boca Raton, USA, 2009. ISBN

978-1-4200-6588-6

Jamshidi09b Mo Jamshidi (Editor):

Systems of Systems Engineering – Innovations for the 21st

Century

John Wiley & Sons Inc., Hoboken, New Jersey, USA, 2009. ISBN 978-0-470-19590-1

Janicak15 Christopher A. Janicak:

Safety Metrics - Tools and Techniques for Measuring Safety

Performance Bernan Print, Revised edition, 2015. ISBN 978-1-

5988-8754-9

Jaquith07 Andrew Jaquith:

Security Metrics - Replacing Fear, Uncertainty, and Doubt

Addison-Wesley Professional, USA, 2007. ISBN 978-0-321-34998-9

Johnson18 Anne Frances Johnson et. al.:

Recoverability as a First-Class Security Objective

National Academies Press, Washington, USA. Proceedings of a

Workshop, 2018. ISBN 978-0-309-48370-4. Downloadable from:

https://www.nap.edu/download/25240 [last accessed: 1.10.2018]

Josephsen13 David Josephsen:

Nagios – Building Enterprise-Grade Monitoring Infrastructures for Systems and Networks

Prentice Hall Inc., USA, 2nd edition, 2013. ISBN 978-0-133-13573-

2

Julian17 Mike Julian:

Practical Monitoring – Effective Strategies for the Real World

O'Reilly UK Ltd., 2017. ISBN 978-1-491-95735-6

Kaplan15 James M. Kaplan, Tucker Bailey, Derek O'Halloran, Alan Marcus, Chris Rezek:

Beyond Cybersecurity – Protecting Your Digital Business

John Wiley & Sons Inc., N.J., USA, 2015. ISBN 978-1-119-02684-6

Killmeyer06 Jan Killmeyer:

Information Security Architecture - An Integrated Approach

To Security in The Organization

Auerbach Publishers Inc., USA, 2006. ISBN 978-0-849-31549-7

Kim16 Gene Kim, John Willis, Patrick Debois, Jez Humble, John Willis:

The DevOPS Handbook – How to Create World-Class Agility,

Reliability, and Security in Technology Organizations

IT Revolution Press, Portland, USA, 2016. ISBN 978-1-942788-00-3

King01 Christopher M. King, Curtis E. Dalton), T. E. Osmanoglu:

Security Architecture – Design, Deployment and Applications

Mcgraw-Hill Professional, USA, 2001. ISBN 978-0-072-13385-1

Knight12 John Knight:

Fundamentals of Dependable Computing for Software

Engineers

Chapman and Hall/CRC, Inc., USA, 2012. ISBN 978-1-439-86255-

1

Knight14 John C. Knight:

Fundamentals of Dependable Computing

Tutorial ICSE 2014, 2014. Downloadable from:

http://2014.icse-

conferences.org/sites/default/files/icse.tutorial.session.1.pdf [last

accessed 14.8.2017]

Knight19 Alissa Knight:

Hacking Connected Cars – Tactics, Techniques, and

Procedures

John Wiley & Sons Inc., USA, 2019. ISBN 978-1-119-49180-4

Koç18 Çetin Kaya Koç (Editor):

Cyber-Physical Systems Security

Springer Nature Switzerland, Cham, 2018. ISBN 978-3-319-98934-

1

Koehler17 Thomas R. Koehler:

Understanding Cyber Risk – Protecting Your Corporate Assets

Routledge Chapman Hall Publishing, USA, 2017. ISBN 978-1-472-47779-8

Koren07 Israel Koren, C. Mani Krishna:

Fault-Tolerant Systems

Morgan Kaufmann Publishing, USA, 2007. ISBN 978-0-120-88525-1

Kshetri10 Nir Kshetri:

The Global Cybercrime Industry – Economic, Institutional and

Strategic Perspectives

Springer-Verlag, Heidelberg, 2010. ISBN 978-3-642-11521-9

Landoll16 Douglas J. Landoll:

Information Security Policies, Procedures, and Standards – A

Practitioner's Reference

CRC Press, USA, 2016. ISBN 978-1-482-24589-9

Laprie13 Jean-Claude Laprie (Editor):

Dependability: Basic Concepts and Terminology: In English,

French, German, Italian and Japanese

Springer, Germany (Softcover reprint of the original 1st edition

1992), 2013. ISBN 978-3-709-19172-9

Larrey17 Philip Larrey:

Connected World – From Automated Work to Virtual Wars: The

Future, By Those Who Are Shaping It

Portfolio Penguin, UK, 2017. ISBN 978-0-241-30842-4

Laykin13 Erik Laykin:

Investigative Computer Forensics – The Practical Guide for

Lawyers, Accountants, Investigators, and Business Executives

John Wiley & Sons, Inc., USA, 2013. ISBN 978-0-470-93240-7

Lee17 Edward Ashford Lee, Sanjit Arunkumar Seshia:

Introduction to Embedded Systems – A Cyber-Physical

Systems Approach

The MIT Press, Cambridge MA, USA, 2nd edition 2017. ISBN 978-0-

262-53381-2

Leveson11 Nancy G. Leveson:

Engineering a Safer World – Systems Thinking applied to

Safety

MIT Press, Cambridge MA, USA, 2011. ISBN 978-0-262-01662-9

Li17b Shancang Li, Li Da Xu:

Securing the Internet of Things

Syngress Publishing (Elsevier), Cambridge, USA, 2017. ISBN 978-0-12-804458-2

Liska16 Allan Liska, Timothy Gallo:

Ransomware – Defending Against Digital Extortion

O'Reilly Publishing, UK Ltd., 2016. ISBN 978-1-491-96788-1

Little03 David Little, David A. Chapa:

Implementing Backup and Recovery – The Readiness Guide for

the Enterprise

John Wiley & Sons Inc., USA, 2003. ISBN 978-0-471-22714-4

Loukas15 George Lukas:

Cyber-Physical Attacks – A Growing Invisible Threat

Butterworth-Heinemann (Elsevier), Oxford, UK, 2015.

ISBN 978-0-12-801290-1

Luzeaux11 Dominique Luzeaux, Jean-René Ruault, Jean-Luc Wipplere

(Editors):

Complex Systems and Systems of Systems Engineering

iSTE Publishing Ltd., London UK, 2011. Distributed by John Wiley & Sons Inc., N.Y., USA. ISBN 978-1-848-21253-4

Maguire06 Richard Maguire:

Safety Cases and Safety Reports – Meaning, Motivation and

Management

CRC Press Inc., USA, 2006. ISBN 978-0-754-64649-5

Mahmoud13 Magdi S. Mahmoud, Yuanqing Xia:

Analysis and Synthesis of Fault-Tolerant Control Systems

John Wiley & Sons, Inc., N.Y., USA, 2013. ISBN 978-1-118-54133-

3

Maier06 Phillip Q. Maier:

Audit And Trace Log Management – Consolidation and

Analysis

Auerbach Publishers Inc., USA, 2006. ISBN 978-0-849-32725-4

Mansouri16 Houssem Mansouri:

Fault Tolerance in Mobile and Ad hoc Networks via

Checkpointing

LAP LAMBERT Academic Publishing, 2016. ISBN 978-3-330-

00310-1

Marcus03 Evan Marcus:

Blueprints for High Availability

John Wiley & Sons Inc., USA, 2003. ISBN 978-0-471-43026-1

Marion16 Nancy Marion:

Introduction to Cybercrime – Computer Crimes, Laws, and

Policing in the 21st Century

Praeger Security International, 2016. ISBN 978-1-4408-3533-9

Mateski17 Mark Mateski, Cassandra M. Trevino, Cynthia K. Veitsch, Mark

Harris, Scott Maruoka, Jason Frye:

Cyber Threat Metrics

CreateSpace Independent Publishing Platform, 2017. ISBN 978-1-5424-7775-8

Matulevičius17 Raimundas Matulevičius:

Fundamentals of Secure System Modelling

Springer-Verlag, 2017. ISBN 978-3-319-61716-9

Maurer16 Markus Maurer, J. Christian Gerdes, Barbara Lenz, Hermann

Winnder (Editors):

Autonomous Driving – Technical, Legal and Social Aspects

Springer Verlag, Germany, 2016. ISBN 978-3-662-48845-4

McCormick15 John W McCormick, Peter C. Chapin:

Building High Integrity Applications with SPARK

Cambridge University Press, Cambridge, UK, 2015. ISBN 978-1-

107-65684-0

McKay17 Kerry A. McKay, Larry Bassham, Meltem Sönmez Turan, Nicky Mouha:

Report on Lightweight Cryptography (US National Institute of Standards and Technology Report NISTIR 8114)

CreateSpace Independent Publishing Platform, 2017. ISBN 978-1-

9811-1346-0. Downladable from: https://nvlpubs.nist.gov/nistpubs/ir/2017/NIST.IR.8114.pdf

[last accessed: 9.9.2018]

Mead16 Nancy R. Mead, Carol C. Woody:

Cyber Security Engineering – A Practical Approach for

Systems and Software Assurance

Addison-Wesley Professional, USA, 2016. ISBN 978-0-13-418980-2

Mehan16 Julie E Mehan:

Insider Threat – A Guide to Understanding, Detecting, and

Defending Against the Enemy from Within

IT Governance Publishing, 2016. ISBN 978-1-8492-8839-2

Merkow10 Mark S. Merkow, Lakshmikanth Raghavan:

Secure and Resilient Software Development

Auerbach Publications (Taylor & Francis), FL, USA, 2010. ISBN

978-1-439-82696-6

Merkow11 Mark S. Merkow, Lakshmikanth Raghavan:

Secure and Resilient Software – Requirements, Test Cases, and

Testing Methods

Auerbach Publications (Taylor & Francis), FL, USA, 2011. ISBN

978-1-439-86621-4

Mitnick17 Kevin Mitnick:

The Art of Invisibility – The World's Most Famous Hacker

Teaches You How to Be Safe in the Age of Big Brother and Big Data

Little, Brown and Company, USA, 2017. ISBN 978-0-3165-5454-1

Moeller16 Dietmar P.F. Moeller:

Guide to Computing Fundamentals in Cyber-Physical Systems

Springer-Verlag, 2016. ISBN 978-3-319-25176-9

Moore10 Robert Moore:

Cybercrime – Investigating High-Technology Computer Crime

Anderson Publishing, Oxon, UK, 2nd edition, 2010. ISBN 978-1-

4377-5582-4

Myklebust18 Thor Myklebust, Tor Stålhane:

The Agile Safety Case

Springer-Verlag, 2018. ISBN 978-3-319-70264-3

Nakajima17 Shin Nakajima, Jean-Pierre Talpin, Masumi Toyoshima, Huafeng

Yu (Editors):

Cyber-Physical System Design from an Architecture Analysis

Viewpoint (Communications of NII Shonan Meetings)

Springer Nature Singapore Pte Ltd., 2017. ISBN 978-981-10-4435-9

Nathan05 Ron Ben Nathan:

Implementing Database Security and Auditing

Elsevier Digital Press, Oxford, UK, 2005. ISBN 1-55558-334-2

Northrop06 Linda Northrop et. al.:

Ultra-Large-Scale Systems – The Software Challenge of the

Future

Carnegie Mellon SEI (Software Engineering Institute), 2006. ISBN

978-0-9786-956-0-6. Downloadable from: https://resources.sei.cmu.edu/asset_files/Book/2006_014_001_3

0542.pdf [last accessed 15.9.2018]

O'Neil17 Cathy O'Neil:

Weapons of Math Destruction – How Big Data Increases

Inequality and Threatens Democracy

Penguin Publishing, USA, 2017. ISBN 978-0-141-98541-1

Oriyano16 Sean-Philip Oriyano:

Penetration Testing Essentials

Sybex (John Wiley & Sons., Indiana), USA, 2016. ISBN 978-1-119-23530-9

Orondo14 Omondi Orondo:

Identity and Access Management – A Systems Engineering

Approach

CreateSpace Independent Publishing Platform, 2014. ISBN 978-1-

4993-5706-6

Owen19 Tim Owen, Wayne Noble, Faye Christabel Speed:

New Perspectives on Cybercrime

(Palgrave Studies in Cybercrime and Cybersecurity)

Palgrave Macmillan Publishing, USA, 2019. ISBN 978-3-319-85258-4

Paar10 Christof Paar, Jan Pelzl:

Understanding Cryptography – A Textbook for Students and

Practitioners

Springer-Verlag, 2010. ISBN 978-3-642-04100-6

Pelliccione07 P. Pelliccione, H. Muccini, N. Guelfi, A. Romanofsky:

Software Engineering and Fault Tolerant Systems

World Scientific Publishing Inc., Singapore, 2007. ISBN 978-9-

8127-0503-7

Peltier04 Thomas R. Peltier:

Information Security Policies and Procedures - A Practitioner's

Reference

Taylor & Francis Ltd, USA, 2nd edition, 2004. ISBN 978-0-8493-

1958-7

Pont17 Michael J. Pont:

The Engineering of Reliable Embedded Systems – Developing

Software for 'Sil 0' to 'Sil 3' Designs Using Time-Triggered

Architectures

SafeTTy Systems Ltd., Great Dalby, UK, 2017. ISBN 978-0-9930-3554-8

Poschmann09 Axel Poschmann:

Lightweight cryptography – Cryptographic Engineering for a

Pervasive World

Bochumer Universitätsverlag Westdeutscher Universitätsverlag,

Germany, 2009. ISBN 978-3-89966-341-9

Proctor02 Paul E. Proctor, F. Christian Byrnes:

The Secured Enterprise – Protecting Your Information Assets

Prentice Hall Publishing, USA, 2002. ISBN 978-0-130-61906-8

Pullum01 Laura L. Pullum:

Software Fault Tolerance Techniques and Implementation

Artech House Publishing, USA, 2001. ISBN 978-1-580-53137-5

Rajkumar17 Raj Rajkumar, Dionisio De Niz, Mark Klein:

Cyber-Physical Systems

Addison-Wesley, Boston, USA, 2017. ISBN 978-0-321-92696-8

Ransome13 James Ransome, Anmol Misra:

Core Software Security – Security at the Source

Taylor & Francis Ltd., USA, 2013. ISBN 978-1-466-56095-6

Rerup18 Neil Rerup, Milad Aslaner:

Hands-On Cybersecurity for Architects – Plan and Design

Robust Scurity Architectures

Packt Publishing, Birmingham, UK, 2018. ISBN 978-1-7888-3026-3

Riascos10 Luis A.M. Riascos, Paulo E. Miyagi:

Fault Tolerance in Manufacturing Systems – Applying Petri

Nets

VDM Verlag Dr. Müller, Germany, 2010. ISBN 978-3-6392-7556-8

Rierson13 Leanna Rierson:

Developing Safety-Critical Software – A Practical Guide for

Aviation Software and DO-178C Compliance

Taylor & Francis, Inc., USA, 2013. ISBN 978-1-439-81368-3

Romanovsky17 Alexander Romanovsky, Fuyuki Ishikawa (Editors):

Trustworthy Cyber-Physical Systems Engineering

CRC Press, Boca Raton FL, USA, 2017. ISBN 978-1-4978-4245-0

Rushby01 John M. Rushby:

Bus-Architectures for Safety-Critical Embedded Systems

EMSOFT 01 Proceedings of the first International Workshop on

Embedded Software, October 8-10, 2001, pp. 306-323. Springer-Verlag, Berlin. ISBN 3-540-42673-6

Sabella18 Anthony Sabella, Rik Irons-Mclean, Marcelo Yannuzzi:

Orchestrating and Automating Security for the Internet of

Things – Delivering Advanced Security Capabilities from Edge

to Cloud for IoT

Cisco Systems Inc., USA, 2018. ISBN 978-1-5871-4503-2

SASWG19 Safety of Autonomous Systems Working Group (SASWG):

Safety Assurance Objectives for Autonomous Systems

SASWG, 2019. ISBN 978-1-79042-122-0

Saxe18 Joshua Saxe, Hillary Sanders:

Malware Data Science – Attack Detection and Attribution

No Starch Press Inc., San Franciso, USA, 2018. ISBN 978-1-5932-

7859-5

Saydjari18 O. Sami Saydjari:

Engineering Trustworthy Systems – Get Cybersecurity Design Right the First Time

McGraw Hill Education, N.Y., USA, 2018. ISBN 978-1-260-11817-9

Schmidt06 Klaus Schmidt:

High Availability and Disaster Recovery – Concepts, Design, Implementation

Springer-Verlag, 2006. ISBN 978-3-540-24460-8

Schneiderman15 Ron Schneiderman:

Modern Standardization – Case Studies at the Crossroads of

Technology, Economics, and Politics

Standards Information Network, 2015. ISBN 978-1-1186-7859-6

Schoenfield15 Brook S. E. Schoenfield:

Securing Systems – Applied Security Architecture and Threat

Models

CRC Press (Francis & Taylor), USA, 2015. ISBN 978-1-482-23397-

1

Scholz14 James A. Scholz:

Enterprise Architecture and Information Assurance –

Developing a Secure Foundation

Auerbach Publishin, USA, 2014. ISBN 978-1-439-84159-4

Schumacher05 Markus Schumacher, Eduardo Fernandez-Buglioni, Duane Hybertson, Frank Buschmann, Peter Somerlad:

Security Patterns: Integrating Security and Systems Engineering

John Wiley & Sons, USA, 2005.ISBN 978-0-470-85884-4

Segal16 Adam Segal:

The Hacked World Order – How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age

PublicAffairs, USA, 2016. ISBN 978-1-6103-9415-4

Selby17 Nick Selby, Heather Vescent:

Cyber Attack Survival Manual – From Identity Theft to The

Digital Apocalypse and Everything in Between

Weldon Owen Publishing, 2017. ISBN 978-1-6818-8175-1

Shemanske17 Thomas R. Shemanske:

Modern Cryptography and Elliptic Curves – A Beginner's Guide

American Mathematical Society, USA, 2017. ISBN 978-1-470-

43582-0

Sherwood05 John Sherwood:

Enterprise Security Architecture – A Business-Driven

Approach

McGraw-Hill Education Ltd., 2005. ISBN 978-1-578-20318-5

Smith10 David J. Smith, Kenneth G. L. Simpson:

Safety Critical Systems Handbook – A Straight forward Guide

to Functional Safety, IEC 61508 (2010 EDITION) and Related

Standards, Including Process IEC 61511 and Machinery IEC

62061 and ISO 13849

Butterworth-Heinemann Publishing, Oxford, UK, 3rd edition, 2010.

ISBN 978-0-080-96781-3

Smith11 David J. Smith, Kenneth G.L. Simpson:

Safety Critical Systems Handbook – A straightforward guide to functional safety, IEC 61508 and related standards

Butterworth-Heinemann (Elsevier), Oxford UK, 3rd edition, 2011.

ISBN 978-0-08-096781-3

Smith17 Sean Smith:

The Internet of Risky Things – Trusting the Devices That Surround Us

O'Reilly UK Ltd., 2017. ISBN 978-1-491-96362-3

Snedaker13 Susan Snedaker:

Business Continuity and Disaster Recovery Planning for IT

Professionals

Syngress Publisher, 2nd edition, 2013. ISBN 978-0-1241-0526-3

SolisTech16 Solis Tech:

Malware – Malware Detection & Threats Made Easy!

CreateSpace Independent Publishing Platform, 2nd edition, 2016.

ISBN 978-1-5236-9310-8

Song18 Houbing Song, Glenn A. Fink, Sabina Jeschke (Editors):

Security and Privacy in Cyber-Physical Systems –

Foundations, Principles, and Applications

John Wiley-IEEE Press, Chicester, UK, 2018. ISBN 978-1-119-

22604-8

Stevens11 Renee Stevens:

Engineering Mega-Systems – The Challenge of Systems

Engineering in the Information Age

Auerbach Publications, Taylor & Francis Group, Boca Raton, USA,

2011. ISBN 978-1-4200-7666-0

Stolfo09 Salvatore J. Stolfo, Steven M. Bellovin, Shlomo Hershkop, Angelos Keromytis, Sara Sinclair, Sean W. Smith (Editors):

Insider Attack and Cyber Security – Beyond the Hacker

Springer-Verlag, 2009. ISBN 978-1-441-94589-1

Sutton18 David Sutton:

Business Continuity in a Cyber World – Surviving

Cyberattacks

Business Expert Press, LLC, N.Y., 2018. ISBN 978-1-9474-4146-0

Talukder08 Asoke K. Talukder, Manish Chaitanya:

Architecting Secure Software Systems

Auerbach Publications (Taylor & Francis), FL, USA, 2008. ISBN

978-1-420-08784-0

Taylor14 Robert W. Taylor, Eric J. Fritsch, John Liederbach:

Digital Crime and Digital Terrorism

Prentice Hall, USA, 2014. ISBN 978-0-133-45890-9

Tornhill15 Adam Tornhill:

Your Code As a Crime Scene – Use Forensic Techniques to

Arrest Defects, Bottlenecks, and Bad Design in Your Programs

The Pragmatic Bookshelf, Dallas, USA, 2015. ISBN 978-1-68050-038-7

Vacca18 John R. Vacca:

Computer Forensics – Computer Crime Scene Investigation

Jones & Bartlett Publishing Inc., 3rd edition, 2018. ISBN 978-0-

7637-7997-9

Verma13 Ajit Kumar Verma, Srividya Ajit, Manoj Kumar:

Dependability of Networked Computer-based Systems

Springer, Heidelberg (Springer Series in Reliability Engineering),

2013. ISBN 978-1-447-12693-5

Volynkin09 Alexander Volynkin:

Modern Malicious Software – Taxonomy and Advanced

Detection Methods

VDM Verlag Dr. Müller, Germany, 2009. ISBN 978-3-6391-2295-4

Wahe11 Stefan Wahe:

Open Enterprise Security Architecture – A Framework and Template for Policy-Driven Security

Van Haren Publishing, 2011. ISBN 978-9-0875-3672-5

Wall07 David S. Wall:

Cybercrime – The Transformation of Crime in the Information Age

Polity Press, Cambridge, UK, 2007. ISBN 978-0-7456-2736-6

Warwick1990 K. Warwick, M.T. Tham (Editors):

Failsafe Control Systems - Applications and emergency

management

Springer-Verlag, 1991. ISBN 978-0-412-37740-2

Wheeler11 Evan Wheeler

Security Risk Management – Building an Information Security

Risk Management Program from the Ground Up

Syngress Publishing, USA, 2011. ISBN 978-1-5974-9615-5

White18 ichard A. White:

Cybercrime – The Madness Behind the Methods

CreateSpace Independent Publishing Platform, 2018. ISBN 978-1-

9798-4857-2

Wong00 Caroline Wong:

Security Metrics - A Beginner's Guide

Osborne Publisher,2000. ISBN 978-0-071-74400-3

Wong18 W. Wong:

The Risk Management of Safety and Dependability – A Guide

for Directors, Managers and Engineers

Woodhead Publishing, 2018. ISBN 978-0-0810-1439-4

Yang17 Mengfei Yang, Gengxin Hua, Yanjun Feng, Jian Gong:

Fault Tolerance Techniques for Spacecraft Control Computers

John Wiley & Sons Inc., USA, 2017. ISBN 978-1-119-10727-9

Young10 Carl Young:

Metrics and Methods for Security Risk Management

Syngress Publishing, 2010. ISBN 978-1-8561-7978-2

Yu14 Shui Yu:

Distributed Denial of Service Attack and Defense

Springer-Verlag, 2014. ISBN 978-1-461-49490-4

Zongo18a Phillimon Zongo:

The Five Anchors of Cyber-Resilience – Why some Enterprises

are hacked into Bankruptcy while others easily bounce back

Broadcast Books, Australia, 2018. ISBN 978-0-6480078-4-5

Zongo18b Phillimon Zongo:

The Five Anchors of Cyber Resilience – Why some enterprises

are hacked into bankruptcy, while others easily bounce back

CISO Advisory, 2018. ISBN 978-0-6480-0784-5